Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Controlled access

The design and manufacture of adsorbents for specific appHcations involves manipulation of the stmcture and chemistry of the adsorbent to provide greater attractive forces for one molecule compared to another, or, by adjusting the size of the pores, to control access to the adsorbent surface on the basis of molecular size. Adsorbent manufacturers have developed many technologies for these manipulations, but they are considered proprietary and are not openly communicated. Nevertheless, the broad principles are weU known. [Pg.269]

Ensure vents relieve to a safe location. If vented to atmosphere, ensure proper classification and controlled access... [Pg.75]

Prevention of arson Control access at all times Screen employees and casual labour Lock away flammable substances and keep combustibles away from doors, windows, fences Provide regular fire safety patrols, even where automatic systems are provided Secure particularly storage and unmanned areas... [Pg.196]

Ensure appropriate levels of security, hazard warning notices, fences, patrols. Control access including vehicles Segregate/seal drains... [Pg.248]

Contractors and subcontractors are typically required by contract to be responsible for their own workers and should provide a level of oversight to meet all specifications. The primary contractor who is responsible for the worksite typically establishes the minimum requirements, controls access to the worksite, and verifies that subcontractors fulfill their health and safety duties and responsibilities. Wlien these specifications are defined, all contractors and subcontractors should meet or exceed these requirements, as appropriate. This could be based on the nature of the assigned tasks and associated hazards [2]. [Pg.29]

Work zones are designed to control access to actual and anticipated hazards. Work zone positioning is based on hazard characterization and exposure assessment. Anticipated work activity, potential releases, and the amount of contaminant dispersion are important for delineating these zones [3]. [Pg.81]

The primary contractor at Site A had identified clean zones, buffer zones, and related site control procedures in its written plan however, onsite implementation differed from those specified in the plan. For example, the exclusion zones identified in the plan at the upper pad of the wastewater treatment plant, the dredge area, and the solid waste storage area were marked with signs requiring PPE, but were not labeled with red banners as called for in the plan. In addition, the exclusion zones did not have controlled access through one point of entry as described in the plan, nor were the buffer zones established and demarcated with yellow banners. [Pg.200]

Contractor/snbcontractor A party in either the prime or subcontractor role, or otherwise providing goods or services to the organization, who performs some of the obligations of a particular prime contract. For example, a contractor hired to put up temporary fencing around a work area to control access would be a subcontractor who must be prequalified. [Pg.214]

Which verification areas have restricted access and how you control access... [Pg.421]

Local operator display with clear graphics and controlled access to parameters... [Pg.272]

Security requirements (controlled access to certain instruments or operations, etc.)... [Pg.5]

Control access at all times Screen employees and casual labour... [Pg.152]

Any funding bids would build in the cost of converting the undercroft to the highest curatorial standards, says Mark. And the warden would control access. ... [Pg.230]

Ultimately, assembly occurs and release of virions from die cell occurs as a result of cell lysis. The features of replication of these simple RNA viruses are themselves fairly simple. The viral RNA itself functions as an mRNA and regulation occurs primarily by way of controlling access of ribosomes to the appropriate start sites on the viral RNA. [Pg.134]

Traweek explores the many ways in which borderlands such as Tsukuba Science City allow a strategic manipulation of the conventions and structures of scientific work. KEK is a highly sophisticated science laboratory located in a province that is seen by many Japanese to be a hick province, not the real Japan, and it falls outside the usual structures of university and national politics in Japan (456). Yet the institution s position outside the normal circuits of power and scientific culture allows it to appeal to international science communities and to reshape scientific culture in Japan. It is largely free from the control of the established universities and their models of resource allocation (in which powerful professors control access to resources [456]). [Pg.198]

A chemical engineer may have a choice of inherent safety variables, such as quantity stored or process temperatures and pressures, or process safety measures such as emergency isolation valves or containment systems, all of which may greatly reduce the vulnerabilities or the consequences of intentional loss. These are in addition to traditional security measures, which may include physical security, background checks, administrative controls, access controls, or other protective measures. For a more complete discussion of the options, refer to the AIChE Center for Chemical Process Safety Guidelines for Analyzing and Managing the Security Vulnerabilities of Fixed Chemical Sites and other references.f... [Pg.106]

The primary mission of the Decontamination Element is to turn chemical/biological victims into patients through mass decontamination procedures by establishing a site capable of providing initial and sustained operational decontamination of Force personnel (rescue workers), ambulatory, and non-ambulatory patients. The Decontamination Element also handles decontamination of CBIRF members, attachments, vehicles, and equipment that have entered the incident site controls access into and out of the incident site handles processing of surety material and evidence while maintaining chain of custody through the site and handles limited area decontamination of the incident site. [Pg.208]

Entry Point A specified and controlled access into a hot zone at a hazardous materials incident. [Pg.311]

Table 3 shows pA values for practolol and propranolol against isoprenaline induced tachycardia in the guinea pig atria, relaxation of the tracheal chain, and adenylate cyclase activity of purified membrane fragments prepared from guinea pig heart and lung. While practolol is clearly cardioselective in the tissue preparations it becomes non-selective on the membrane fragments. It is conceivable that in the purification of the membranes the integrity of the micro-environment which controls access to the receptors in the different tissues, is destroyed. [Pg.14]

Limit access to facilities and control access to pumping stations, and to chemical and fuel storage areas, giving close scrutiny to visitors and contractors. [Pg.93]

Control access to computer networks and control systems, and change the passwords frequently. [Pg.93]

Biometric security systems use biometric technology combined with some type of locking mechanism to control access to specific assets. In order to access an asset controlled by a biometric security system, an individual s biometric trait must be matched with an existing profile stored in a database. If there is a match between the two, the locking mechanism (which could be a physical lock, such as at a doorway an electronic lock, such as at a computer terminal or some other type of lock) is disengaged, and the individual is given access to the asset. [Pg.173]

A control panel, which serves as the connection point between various system components. The control panel communicates information back and forth between the sensor and the host computer, and controls access to the asset by engaging or disengaging the system lock based on internal logic and information from the host computer. [Pg.173]

While card readers are similar in the way that the card reader and control unit interact to control access, they are different in the way data is encoded on the cards and the way these data are transferred between the card and the card reader. There are several types of technologies available for card reader systems. These include the following ... [Pg.176]

To what extent are methods to control access to sensitive assets in place ... [Pg.224]

FIGURE 1.5. Schematic drawing showing the use of a temperature sensitive polymer to control access to the active sites of an enzyme. Access is denied when the polymer (dotted line) is in the crystalhne state (left), and allowed when the polymer is in the flexible state (right). [Pg.11]


See other pages where Controlled access is mentioned: [Pg.423]    [Pg.169]    [Pg.150]    [Pg.1038]    [Pg.19]    [Pg.103]    [Pg.44]    [Pg.230]    [Pg.180]    [Pg.298]    [Pg.72]    [Pg.178]    [Pg.82]    [Pg.173]    [Pg.174]    [Pg.190]    [Pg.194]    [Pg.5]    [Pg.11]    [Pg.266]    [Pg.333]    [Pg.324]   
See also in sourсe #XX -- [ Pg.64 ]

See also in sourсe #XX -- [ Pg.121 , Pg.138 ]




SEARCH



Access and Crowd Control

Access control

Accessibility, carbon dynamics control

Biometric access control

Connection-control access point

Control of benefit access and sojourn time

Insurance access control

Ladder access control

Medium access control

Security access control

Zone 2A Airlock Access Controls

© 2024 chempedia.info